zlacker

[parent] [thread] 3 comments
1. Vortex+(OP)[view] [source] 2026-02-04 15:06:57
I haven't looked at the MCP server, but generally, reverse engineering with AI is quite underrated. I’ve had success extracting encryption keys from an android app that uses encryption to vendor-lock users by forcing them to use that specific app to open files that should otherwise be in an open format.

By the way, this app had embedded the key into the shader, and it was required to actually run this shader on android device to obtain the key.

replies(3): >>MaxLei+Hd >>Alifat+9e >>baby_s+mh
2. MaxLei+Hd[view] [source] 2026-02-04 16:08:57
>>Vortex+(OP)
My friend and I were able to give claude a (no longer updated) unity arcade game. It decompiled it and created a one-to-one typescript port so it can run in the browser and now we're adding multiplayer support (for personal use, don't worry HN - we won't be distributing it). I'm very excited for what AI can do for legacy software.
3. Alifat+9e[view] [source] 2026-02-04 16:10:53
>>Vortex+(OP)
I agree, I tried RE using multiple tools connected to MCP and a agent, it was tasked to recreate what the source code might have looked like from a binary and what possible vulnerabilities there could be. It did a incredible job when I compared it to the actual source.
4. baby_s+mh[view] [source] 2026-02-04 16:24:05
>>Vortex+(OP)
> By the way, this app had embedded the key into the shader, and it was required to actually run this shader on android device to obtain the key.

Oh that's clever. I don't suppose you can share more about how this was done?

[go to top]